Strata + Hadoop World = Big Data x Innovation

The recent Strata + Hadoop World show in San Jose was again a fascinating cross-section of the larger big data and analytics market space. Watch our "man on the scene" video or read on below for some quick highlights. Note: the one-side flared collar is a fashion fad you saw here first!

Topics: Data Management

Instart Logic Use of Optimization to Disrupt the CDN Market

The content delivery network (CDN) market largely appears to be a mature market that is dominated by Akamai due to the market’s apparent affinity for a high degree of physical network infrastructure and caching to minimize the impact of last mile issues. It’s therefore surprising to see the degree of attention focused on Instart Logic by some of Silicon Valley’s leading entrepreneurs and VCs. Instart Logic is a west coast application delivery startup with funding from Andreessen Horowitz, Greylock Partners, Kleiner Perkins Caufield & Byers, Sutter Hill Ventures, Tenaya Capital, and several notable Silicon Valley angel investors. This is the A-team when it comes to investors and a group whose attention is not easy to attract.

0% Cybersecurity Job Unemployment in Washington

I’ve written a lot about the global cybersecurity skills shortage over the past few years. Here’s some recent ESG data that illustrates this problem:

Topics: Cybersecurity

More on Network Encryption and Security

In a blog I posted last week, I described that enterprise organizations are encrypting more of their network traffic. This is a mixed blessing in that it can protect data confidentiality and integrity but it also opens a camouflaged threat vector back into the organization. To address this risk, a majority (87%) of organizations decrypt and then inspect SSL/TLS traffic looking for things like reconnaissance activity, malware, and C2 communications according to ESG research.

What’s New in Data Protection from IBM Interconnect 2015

Every time that I take a close look at IBM’s data protection portfolio, veiled under its storage solutions umbrella, I am happily surprised by the technology—and my guess is that you would be too.

Topics: Data Protection

TDWI Gets Fresh

I'm a "big data" guy, in the broadest, most aggressively futuristic sense of the term. So when Tom Davenport opened the TDWI keynote saying he doesn't like the Kardashians and he doesn't like the term "big data," I was alarmed. Was this going to be another grandpa-style lecture on how business intelligence and data warehousing didn't need any of them new-fangled gizmos? You know the spiel, "Back in my day we did analytics on the way to school, for 10 miles, uphill both ways, in the snow, without shoes, and we were happy to do it!" When he started on his history of decision support analytics, I began to wonder if there there any earlier flights available out of Las Vegas that day....

Topics: Data Management

Violin Refines its Pitch to "Software Major" (includes video)

While it's always tempting to use some musical reference when talking about Violin (and I make no apologies for doing so in my blog title or the video blog below) I was struck by a different metaphor when speaking with CEO Kevin Denuccio recently. His office looks straight at the new home of the 49ers, Levi's Stadium in Santa Clara. Imagine a football team that only played either offense or defense?! That was almost the Violin story early on - it was a perfomance value proposition and not a lot else. But winning requires playing both sides of the ball....and now Violin has rounded out and extended its software data services offerings so as to field a balanced team. Take a look at this video blog to get a quick idea of what's changed:

Topics: Storage

Big Data Deployment Trends (Part II)

In my first post of this blog series on big data deployment models, I discussed some of the fundamental choices enterprises must make and shared a somewhat tongue-in-cheek flowchart to help people think about their options on how to host a new big data environment.

Topics: Data Management

Federal Cybersecurity Duplicity

As part of a whistle-stop tour of Northern California, President Obama held a White House Summit on Cybersecurity and Consumer Protection at Stanford University last Friday. Much to the delight of the Silicon Valley crowd, the President signed an executive order (right there on stage at Stanford) to promote data sharing about digital threats. The summit also highlighted industry leaders like Apple CEO Tim Cook, and large critical infrastructure organizations like Bank of America and Pacific Gas & Electric Co.

Topics: Cybersecurity

Organizing Principles for Optimization

Optimization is surfacing more frequently in the applications and tools markets. I was recently speaking with a vendor who competes in the content delivery network (CDN) market about their optimization technology. Consequently, I started thinking about optimization, its role in decision analytics, and how it is applied.

Optimization is one of nine techniques that I’ve identified that support decision analytics (see the ESG Market Summary Report, Decision Analytics: Building the Foundation for Predictive Intelligence and Beyond, August 2014.)

Optimization anchors the upper left hand corner of the decision analytics continuum that you see below.

Optimization

Enterprises Are Encrypting and Inspecting More Network Traffic

Encrypted traffic has become increasingly ubiquitous at most organizations. According to new ESG research, a vast majority (87%) of organizations surveyed encrypt at least 25% of their overall network traffic today.  Network encryption is a security best practice as it protects the privacy and confidentiality of network traffic as it travels from source to destination. 

Topics: Cybersecurity

Sorting the Big Data Hype from the Bigger Truth (Video)

Here at ESG, we keep exploring the broader big data, business intelligence, and analytics market space. We do this because there is a lot of hype, FUD, and confusion out there, and because we're just naturally curious dudes. Our latest report has just come off the printing presses (ooh, love the smell of warm ink!)

Topics: Data Management

Why Copy Data Management Matters

My article for this month’s TechTarget column is on “Why Copy Data Management Matters.”

In ESG’s Archive & Backup Convergence research, we found that a majority of IT organizations are either using or looking at solutions that managed the “copy data” within their environment:

Topics: Data Protection

Book Report: Countdown to Zero Day

When you work in the cybersecurity domain you face some daunting challenges.  For one thing, cybersecurity is always changing – there are new offensive and defensive tactics, techniques, and procedures (TTPs) constantly that you try to keep up with.  Alternatively, cybersecurity is an extremely broad topic, spanning technology, regulations, law enforcement, geo-political conflict, critical infrastructure, etc. 

When people ask me how to learn about disparate cybersecurity topics, I reply with a single word – “read.”  More specifically, I recommend that they go to their public library and take out one of the many fantastic books written in the past few years on malware (Worm, by Mark Bowden), cybercrime (Kingpin,  by Kevin Poulsen), hackers (We Are Anonymous, Parmy Olson), Cyberwar (Cyberwar, Richard Clarke), etc.  There are loads of other good books available by authors like James Bamford, Steven Levy, John Markoff, Kevin Mitnick, Bruce Schneier, and Cliff Stoll as well. 

Topics: Cybersecurity

Big Data 2015 Predictions: Right So Far!

At the start of the year, about 6 weeks way back, I made a number of predictions about the big data, business intelligence, and analytics market. See my previous posts herehere, and hereWhile it may seem early to measure the results for the current year, from this collection of recent vendor announcements it sure looks like the accuracy will be proven out! 

Topics: Data Management

Cloud and IT Transformation Predictions for 2015

I recently sat down with ESG Founder and Senior Analyst Steve Duplessie to talk about what my expectations are for cloud, converged/hyperconverged technology, and other IT transformation topics in 2015.

Topics: Converged Infrastructure Cloud Platforms & Services

SDS and Flash Predictions for 2015

I recently sat down with ESG VP of Research John McKnight to talk about what my expectations are for the Flash, SDS, and hybrid storage markets in 2015.

Topics: Storage

Mobile, OFS, and Collaboration Predictions for 2015

I sat down recently with ESG Founder and Senior Analyst Steve Duplessie to talk about what my expectations are for mobility and collaboration in 2015:

Topics: Enterprise Mobility Cloud Platforms & Services

Information Security Predictions for 2015

I sat down with ESG Founder and Senior Analyst Steve Duplessie recently to talk about what my expectations are for the information security space in 2015.

Topics: Cybersecurity

Storage Systems Predictions for 2015

I sat down recently with ESG's VP of Research John McKnight to talk about what my expectations are for the storage marketplace in 2015:

Topics: Storage Converged Infrastructure

The Challenges and Benefits of Virtualization Protection

Last week, my article in Windows IT Pro on “Virtualize Everything” stimulated a rather wide range of banter:

  • A few folks pointed out that some servers should not be virtualized, such as some DNS, Active Directory domain controllers, and perhaps the management system that controls your hypervisor infrastructure. Those folks are correct—there absolutely are logical exceptions and “everything” is an intentional exaggeration. But hopefully, we as an IT industry are getting continually closer to server virtualization being the defacto method for server provisioning and management, except where an exception is reasonable.
Topics: Data Protection

Legacy IT Meets Modern Cloud and Mobility Imperatives

Senior Partnering Consultant Kevin Rhone and I were at VMware's PEX event, and we offer thoughts on how cloud and mobility initiatives are impacting legacy IT infrastructures.
Topics: Converged Infrastructure Cloud Platforms & Services

Antivirus Usage Patterns Reveal Hints about Its Effectiveness

For the past few years, everyone seems to be down on antivirus software. This sentiment was exhibited in a recent ESG research report, The Endpoint Security Paradox. When asked to identify challenges associated with their antivirus software, 34% of security professionals complained about too many false positives that classify benign files/software as malware, while 33% said that products are not nearly as effective at blocking and/or detecting malware as they should be.

Topics: Cybersecurity

Factors Shaping Network Security at Enterprise Organizations

As part of my job, I speak with lots of CISOs about their day-to-day activities, challenges, and responsibilities. Motivated by a few of these discussions last summer, I posted a blog called the CISO-centric Information Security Triad, which defined the three primary CISO priorities: security efficacy, operational efficiency, and business enablement. 

How to Choose the Right Big Data Infrastructure

I get asked all the time about the "best" option for deploying big data. Most people are curious about the impact of choices between:

Topics: Data Management

Data Protection Predictions for 2015

Last month, I sat down with my colleague, John McKnight, in an ESG 360 video to share my predictions on how data protection will or should change in 2015 … in five minutes or less:

Topics: Data Protection

Exciting Data Visualization: Understanding the Federal Budget

Ok, I admit that examining the US Federal government's budget doesn't sound exciting. Unless you are a politics junkie, looking for a sound bite to get outraged around, no one wants to pore through a big spreadsheet of long line items. We pay our taxes, we grumble about it, and then we get back to doing something more pleasant. 

Endpoint Security Has Grown More Difficult and Tedious

As I’ve written several times, endpoint security used to be synonymous with a single software product category--antivirus software.  As a result, the endpoint security market was really dominated by five major vendors:  Kaspersky, McAfee, Sophos, Symantec, and Trend Micro.

Fast forward to the past few years and APTs, sophisticated malware, targeted attacks, and zero-day exploits are now changing the endpoint security landscape. 

Topics: Cybersecurity

Dell Debates Big Data in 1, 5, 10 Years

Where will you be on Groundhog’s Day 2016? What about 2020 or 2025? Unless you are Bill Murray or Andie MacDowell, answering this question and predicting the future can be tricky stuff. Yet Dell recently called together some friends to attempt just this sort of long-range prognostication around big data.

I was recently joined on a discussion panel by the brilliant Rebekah Iliff (Chief Strategist at AirPR), the ever-curious Jai Menon (Chief Research Officer at Dell), and the lovely Matt Wolken (VP and GM of Dell Software), and then again with a wider group of technologists for a bigger roundtable.

Topics: Data Management